Resources

NetSentries announces point-of-sale (POS) systems penetration testing service in UAE
The speed at which POS system is evolving is momentous. A feature-rich, compact Point-of-Sale system offers business owners and operators
Read more.
Importance of automation in SOC
Security Operation Centers (SOC) are evolving in all types of organizations across just about every industry verticals. Numerous large to
Read more.
Role Of SOC In PCI DSS
What is PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies
Read more.
Mobile application penetration testing
Mobile Applications have become an essential part of our lives as our dependence on smartphones has grown. But many users
Read more.
Social engineering penetration testing – part II (attack vectors)
Social engineering – attack vectors Phishing The target/victim is manipulated with the appearance possessed by the attacker that he/she represents
Read more.
SOC – Cyber Threat Intelligence Analysis
In the current era of security threat attacks and cyber warfare, it comes as a vital need to persistently monitor
Read more.
DNA Hack
Researchers from the University of Washington say they have successfully hacked into a computer using custom strands of DNA for
Read more.
Social Engineering Penetration Testing – Part 1 (Attack Cycle)
SOCIAL ENGINEERING – ATTACK CYCLE RECONNAISSANCE Attack vectors are determined by the information gathered. Information from the target/victim can be
Read more.
Ransomware: How to Protect Yourself
Ransomware malware encrypts the organization or individual data for extorting ransom amount from the victim. The malicious code is used
Read more.